Connect with us

Technology

Watch out for the new ‘ghost hackers’

Published

on

Watch out for the new ‘ghost hackers’

Imagine if this happened to you. Your spouse passed away and a few weeks after the funeral, you get a message from them that says, “Hi, hope you’re having a great day.” Other friends report they’re getting similar messages from your spouse. Some messages offer big returns in crypto investments.

Join over 500,000 people who get tech smart with my free newsletter.

It’s easy to sign up and one click to cancel if you don’t like it.

“Ghost hackers” have taken over your spouse’s account. It’s a sick new scam. With account owners dead and families focused on grief, the hacking is more likely to go unnoticed. It’s awful, and I want to make sure this doesn’t happen to you or someone you love.

SEE WHAT THE HOME YOU GREW UP IN LOOKS LIKE NOW AND OTHER MAPS TRICKS

Advertisement

It’s not just trolling and ‘investments’
Ghost hackers monitor obituaries and death notices for potential targets. Then, they use their arsenal (hacking weak passwords, guessing security questions and accessing previously leaked credentials) to break in. Often, hackers leapfrog into banking and retirement accounts, making it easy to steal directly from the person who passed. 

The best offense is a good defense

I know firsthand there are a ton of administrative tasks to take care of when a close family member dies — everything from canceling cellphone plans to executing the will. This list now also needs to include memorializing or deleting their social media accounts. 

Luckily, social networks have processes in place for this. For Facebook, ask Facebook to memorialize the account. You’ll need a link to an obituary. You can also request the profile be removed. Instagram has similar steps to Facebook, and the same goes for X.

Now, take time to protect yourself

Advertisement

On Facebook, you can designate a legacy contact to manage your account if you die. They won’t be able to log in, read your messages or delete friends.

CAN YOU SPOT ELECTION DEEPFAKES? HERE’S HOW NOT TO BE DUPED

  • On mobile, select the three-line icon at the bottom right. Scroll and tap Settings & privacy > Settings. Under “Accounts Center,” tap Personal details > Personal details > Account ownership and control > Memorialization.
  • Click your name to select your legacy contact (and notify your contact they’re now in that role). You can also decide if you’d rather have your account deleted after you pass.

Apple’s Legacy Contact is a safe, secure way to give someone access to data stored in your Apple account after you die. You can add more than one Legacy Contact, and all of them can access the account to make decisions. The person must be 13 or older.

Here’s how to set it up on your iPhone:

  • Open Settings and tap your name.
  • Go to Sign-In & Security > Legacy Contact.
  • Tap Add Legacy Contact. You may have to use Face ID, Touch ID or your passcode to authenticate.
  • You can choose a group member if you’re in a Family Sharing group. Or you can tap Choose Someone Else to add someone from your Contacts.
  • Select the person from your Contacts. Tap Continue.
  • You’ll be asked how you want to share your access key. Select Print Access Key or Send Access Key.
  • If you choose to send the key digitally, Apple will create a message letting your contact know you’ve added them as your legacy contact. Tap Send.
Sad woman sitting on a couch

Finally, adjust your Google account. You probably have a few things you’d prefer to keep private in your search, watch and location history. By default, Google auto-deletes account records after 18 months. If you want to shorten that window, you can do so in a few steps.

  • Go to your Google Activity controls and log in with your Google account.
  • Under Web & App Activity, you’ll see Auto-delete. Be sure this is turned On.
  • Click the arrow to choose your preferred timeframe: 3 months, 18 months or 36 months.

Really, you need a digital estate plan

It’s not a legal document but rather a rundown of all your accounts, passwords and online assets with instructions on how to find them. My Mom made one before she passed, and I can’t tell you how much time and stress it saved me during an incredibly emotional time.

TOP LAWMAKER SHARES ‘BIGGEST FEAR’ ABOUT HER KIDS’ DATA ONLINE AS CONGRESS EYES FEDERAL PRIVACY RULES

Advertisement

Your list can be as formal or informal as you like. It could be an Excel spreadsheet or Word doc that includes websites, login details and anything else you want to leave behind. If you go this route, password-protect the file and leave the password in your will.

If you’re comfortable with it, I highly recommend you do this in a password manager. Most have the option to set up a contact who can access your logins when you pass. Use a password notebook if you’re more comfortable with pen and paper.

Here’s a checklist to get you started:

  • Email, social media, financial and cloud storage accounts.
  • Online shopping credentials.
  • Streaming services and other recurring charges.
  • Loyalty programs, including travel rewards.
  • Domain names and website hosting.

I know it’s not fun to think about, but you’ll be helping your loved ones immensely if you do.

Two people sit in a cemetery

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

 

Advertisement

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Amazon says its Prime deliveries are getting even faster

Published

on

Amazon says its Prime deliveries are getting even faster

To me, Prime’s promise of two-day shipping is more of an added bonus to Prime Video and stuff like Fallout. But it’s become an expectation, leading other retailers like Walmart and Target to roll out faster shipping options of their own.

Now, Amazon says its deliveries are getting even faster, announcing that it delivered over 2 billion items the same or next day to Prime members during the first three months of 2024, breaking its record for 2023. The company says it delivered almost 60 percent of Prime orders the same or next day in 60 of the biggest metropolitan areas in the US.

If you buy from Amazon, have you noticed any differences lately? Same-day and next-day options seem to be more widely available, but it’s hard to tell how that applies to different items in different places or whether the associated costs are worth it based on reports of warehouse injuries and workers organizing for better conditions.

The control Amazon has over shipping and fulfillment has helped make it the target of a lawsuit from the Federal Trade Commission. The agency alleges Amazon engages in anticompetitive behavior by unfairly limiting which sellers are eligible for Prime shipping and coercing companies into using its fulfillment services. Amazon claims that the FTC’s efforts could result in “slower or less reliable” Prime shipping for customers.

In 2019, Amazon said it was spending billions to build up an in-house fulfillment operation covering planes, trucks, drones, and robots to rival FedEx and UPS and enable these one-day-or-less deliveries. And last year, it introduced a program that allows sellers to ship their products directly from factories — regardless of whether they’re going to one of Amazon’s many warehouses.

Advertisement
Continue Reading

Technology

How ‘Yahoo Boys’ use real-time face-swapping to carry out elaborate romance scams

Published

on

How ‘Yahoo Boys’ use real-time face-swapping to carry out elaborate romance scams

We’ve all heard of catfish scams – when someone pretends to be a lover on the other side of the screen, but instead, they aren’t who they say they are once their real face is revealed. Now, there’s a similar scam on the rise, and it’s much more sophisticated because scammers can fake the face, too. The scam is known as the “Yahoo Boys” scam, and it’s taking “catfishing” to a whole new level.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Woman on laptop making a heart sign (Kurt “CyberGuy” Knutsson)

How does deepfake technology work?

Deepfake technology uses AI to allow people to impersonate others over audio or video. The technology is essentially able to replicate someone’s face, facial expressions, gestures, voice, etc., so that the scammer can pretend to be someone they aren’t with almost perfect accuracy. Although deepfake technology has some intentions for good – like in the film industry or advertising (though there are some debates regarding the ethics of this) – it’s generally used for more malicious purposes than anything else.

Because it’s very difficult to tell whether or not a deepfake is the real person or a deepfake (and also because deepfakes are relatively new), deepfakes can have the potential to do a lot of damage. From the larger implications of it being used to spread inaccurate news stories that can sway public opinion and political processes to it being used to inflict damage on individuals with scams, it’s important to know what to watch out for.

Advertisement
How ‘Yahoo Boys’ use real-time face-swapping to carry out elaborate romance scams

Woman with a scan on her face (Kurt “CyberGuy” Knutsson)

MORE: EXPOSING THE TOP SCAMS TARGETING COSTCO SHOPPERS

What is the ‘Yahoo Boys’ scam?

The “Yahoo Boys” scam involves a group of sophisticated cybercriminals, primarily based in Nigeria, who are using this technology to conduct what’s otherwise known as romance scams. Like some catfishing attempts, they first build trust with victims through personal and romantic interactions over messaging and, eventually, video calls, where they then manipulate their appearances in real time to match the description and profile they may have shared with them up until that point.

By doing this, they can trick the victim into trusting them even more. This is because most of us still use video as a way to verify a person’s identity, when messaging isn’t convincing enough. Finally, when the timing is right, the victims are often persuaded into transferring money based on various fabricated scenarios, leading to significant financial losses. In fact, the FBI reported over $650 million lost to romance scams like these.

How ‘Yahoo Boys’ use real-time face-swapping to carry out elaborate romance scams

Man on his cellphone (Kurt “CyberGuy” Knutsson)

MORE: DON’T FALL FOR THESE SNEAKY TAX SCAMS THAT ARE OUT TO STEAL YOUR IDENTITY AND MONEY

How does it actually work?

In the case of the “Yahoo Boys” scam, the scammers do their dirty work by:

Advertisement

Step 1: The scammer will use two smartphones or a combination of a smartphone and a laptop. One device is used to conduct the video call with the victim, while the other runs face-swapping software.

Step 2: On a secondary device, the scammer activates face-swapping software. This device’s camera films the scammer’s face, and the software adds a digital mask over it. This mask is a realistic replica of another person’s facial features, which the scammer has chosen to impersonate. The software is sophisticated enough to track and mimic the scammer’s facial movements and expressions in real time, altering everything from skin tone and facial structure to hair and gender to match the chosen identity.

Step 3: For the video call, the scammer uses a primary device with its rear camera aimed at the secondary device’s screen. This screen shows the deepfake – the digitally altered face. The rear camera captures this and sends it to the victim, who sees the deepfake as if it’s the scammer’s actual face. To make the illusion more convincing, the devices are stabilized on stands, and ring lights provide even, flattering lighting. This setup ensures that the deepfake appears clear and stable, tricking the victim into believing they’re seeing a real person.

Step 4: Throughout the call, the scammer speaks using their own voice, although in some setups, voice-altering technology might also be used to match the voice to the deep-faked face. This comprehensive disguise allows the scammer to interact naturally with the victim, reinforcing the illusion.

Though each deepfake scam is different, having a basic level of understanding in terms of how scams like these work can help you recognize them.

Advertisement
How ‘Yahoo Boys’ use real-time face-swapping to carry out elaborate romance scams

Scammer typing on a keyboard (Kurt “CyberGuy” Knutsson)

How to stay safe from deepfake scams

To protect yourself from deepfake scams like the “Yahoo Boys” scam, here’s what you can do:

Verify identities: Always confirm the identity of individuals you meet online through video calls by asking them to perform unpredictable actions in real time, like writing a specific word on paper and showing it on camera.

Be skeptical of unusual requests: Be cautious if someone you’ve only met online requests money, personal information or any other sensitive details.

Enhance privacy settings: Adjust privacy settings on social media and other platforms to limit the amount of personal information available publicly, which can be used to create deepfake content.

Use secure communication channels: Prefer secure, encrypted platforms for communications and avoid sharing sensitive content over less secure channels.

Advertisement

Educate yourself about deepfakes: Stay informed about the latest developments in deepfake technology to better recognize potentially manipulated content.

Report suspicious activity: If you encounter a potential scam or deepfake attempt, report it to the relevant authorities or platforms to help prevent further incidents.

By following these guidelines, you can reduce your risk of falling victim to sophisticated digital scams and protect your personal and financial information from falling into the hands of these scammers.

How ‘Yahoo Boys’ use real-time face-swapping to carry out elaborate romance scams

Woman talking on her cellphone (Kurt “CyberGuy” Knutsson)

MORE: CAN AI HELP SOMEONE STAGE A FAKE KIDNAPPING SCAM AGAINST YOUR FAMILY

Protecting your identity in the age of deepfakes

As deepfake technology becomes more accessible and convincing, the risk of identity theft increases. Scammers can use stolen personal information to create more believable deepfakes, making it harder for you to detect fraud. Furthermore, the sophistication of deepfakes may allow criminals to bypass biometric security measures, potentially granting them unauthorized access to your personal accounts and sensitive financial information. This is where identity theft protection services become invaluable.

Advertisement

Identity Theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

By subscribing to a reputable identity theft protection service, you can add an extra layer of security, ensuring that your digital presence is monitored and protected against the ever-evolving tactics of cybercriminals like the “Yahoo Boys.”

MORE: UNFORGETTABLE MOTHER’S DAY GIFTS 2024

Kurt’s key takeaways

The main targets of the “Yahoo Boys” scam are individuals who establish online romantic relationships with the scammers. Because these victims are often emotionally invested and therefore more susceptible to manipulation, there’s not necessarily a specific age or demographic that can become a victim. And because we know the root of all these scams is the deepfake technology, truly anyone can become a target. So, we hope this helps, but also, be sure to spread the word to friends and family.

Advertisement

Have you heard of any other types of deepfake scams? Or do you know anyone who has been a victim of scams like this? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Continue Reading

Technology

Financial Times signs licensing deal with OpenAI

Published

on

Financial Times signs licensing deal with OpenAI

The Financial Times has struck a deal with OpenAI to license its content and develop AI tools, the latest news organization to work with the AI company. 

The FT writes in a press release that ChatGPT users will see summaries, quotes, and links to its articles. Any prompt that returns information from the FT will be attributed to the publication. 

In return, OpenAI will work with the news organization to develop new AI products. The FT already uses OpenAI products, saying it is a customer of ChatGPT Enterprise. Last month, the FT released a generative AI search function on beta powered by Anthropic’s Claude large language model. Ask FT lets subscribers find information across the publication’s articles. 

Financial Times Group CEO John Ridding says that even as the company partners with OpenAI, the publication continues to commit to “human journalism.”

“It’s right, of course, that AI platforms pay publishers for the use of their material,” Ridding says. He adds that “it’s clearly in the interests of users that these products contain reliable sources.”

Advertisement
Continue Reading

Trending